amz-hot-keywords

v0.1.0

Scrape Amazon Brand Analytics (ABA) weekly hot keyword rankings from AMZ123 and return structured keyword trend data. Use when the user asks about Amazon key...

0· 13·0 current·0 all-time
MIT-0
Download zip
LicenseMIT-0 · Free to use, modify, and redistribute. No attribution required.
Security Scan
VirusTotalVirusTotal
Benign
View report →
OpenClawOpenClaw
Benign
high confidence
Purpose & Capability
Name/description, SKILL.md, workflow, and the Python scraper all align: they launch a headless Chrome session, navigate to amz123.com/usatopkeywords, scrape table rows, compute trends, and write CSV/JSON outputs. No unrelated services, binaries, or credentials are requested.
Instruction Scope
Instructions are focused on scraping and producing output files and include troubleshooting tips. They explicitly instruct running Selenium/Chrome, waiting for page elements, and optionally adding delays or rotating user agents to avoid bot detection. The docs also mention (optionally) adding credential handling if ABA becomes gated — this is not present in current code but is a potential extension. The script writes files to disk and prints the absolute path to stdout (expected behavior).
Install Mechanism
This is an instruction-only skill with no install spec. It relies on external prerequisites (Python 3.9+, Chrome, and Python packages like selenium and pandas) that must be installed by the user. That is reasonable for this task but means the environment must be provisioned manually; there are no automatic or opaque downloads in the package itself.
Credentials
The skill declares no required environment variables, credentials, or config paths. The references mention python-dotenv as an optional extension for credential handling only if ABA becomes gated; currently no secret access is requested, which is proportionate to the stated scraping purpose.
Persistence & Privilege
The skill does not request always:true, does not modify other skills or global agent configuration, and is not installed as a persistent system component. It runs ad-hoc and writes only local output files as documented.
Assessment
This skill appears internally consistent, but review and take precautions before running it: - It automates a headless browser and accesses the public site amz123.com; ensure this activity complies with the site's Terms of Service and with any applicable rules (and avoid automated scraping where prohibited). - You must install Chrome and Python packages (selenium, pandas); there is no automated installer included. Run the script in a controlled environment (container/VM) to limit risk. - The script writes output files to the specified directory and prints the absolute path; avoid running it from directories containing sensitive files to prevent accidental exposure. - The code currently does not request credentials, but the docs note optional credential handling for gated data — if that functionality is added later, treat any requested secrets (env vars, .env files, cookies) as high-risk and inspect the code before providing them. - Because the scraper uses randomized sleeps and a custom user-agent, it could be adjusted to evade bot detection; if you are not comfortable with scraping tools, consider using a sanctioned API or obtain data through official channels. Recommended actions before installing/using: inspect the script yourself or run it in a sandbox, confirm dependencies and Chrome are up-to-date, and start with a small max-results and a safe output directory (e.g., a dedicated data folder).

Like a lobster shell, security has layers — review code before you run it.

latestvk975pvvfb0ycwg75p178dgaqp584h3ep

License

MIT-0
Free to use, modify, and redistribute. No attribution required.

Comments